Term
| What makes up the CIA Triad? |
|
Definition
Confidentiality
Integrity
Availability |
|
|
Term
| How Many Days Does It Normally Take To Discover A Breach? |
|
Definition
|
|
Term
| Who determines security strategy? |
|
Definition
|
|
Term
| Who determines IS Infrastructure? |
|
Definition
|
|
Term
| Who determines IS Policy? |
|
Definition
| IT Leaders and Business Leaders |
|
|
Term
| What prevents some targeted traffic, that can only filter known threats? |
|
Definition
|
|
Term
| What are laws for an organization that protect the organization from potential lawsuits? |
|
Definition
|
|